Posts

Showing posts with the label Asymmetric cryptography

Asymmetric Cryptography (Public Key Cryptography) - Part I

Asymmetric cryptography, also known as public key cryptography, it uses two distinct, yet related keys. One key, the Public Key, is used for encryption and the other, the Private Key, is for decryption. Let say Mahesh wants to send an encrypted message to Shalini , Mahesh will look for Shalini Public key and use it for encrypt the message before sending it. Then Shalini Can decrypt the message using her related private key. if Mahesh encrypts the message using his private key, then the message can be decrypted only using Shalini's public key, thus it will also authenticate Shalini . These encryption and decryption processes happen automatically hence no need to share the keys. Asymmetric cryptography is slower then symmetric cryptography Advantages: 1. Does not require to share key 2. Simple structure RSA is common asymmetric algorithm, I will use the same for this example. To demonstrate, I have used .Net framework in build library “System.Security.Cryptograph

Basic of Cryptography (Type of Cryptography)- Part II

Image
Cryptography Types Cryptography categorized based on number of keys used for encryption and decryption; in this article we will discuss below three types Secret Key Cryptography - It is also call symmetric encryption where for both encryption and decryption uses same key. This is mainly used for confidentiality. Public Key Cryptography - It is also called asymmetric encryption ; this algorithm uses two key's one for encryption and one for decryption. mainly used for authentication. Hash Function - It uses to convert to text in such way that the input cannot be recoverable by using mathematical function.